ancat / meatballLinks
A host monitoring proof of concept that uses python and ebpf to watch for bad behavior and optionally take action on it.
☆12Updated 5 years ago
Alternatives and similar repositories for meatball
Users that are interested in meatball are comparing it to the libraries listed below
Sorting:
- egrets monitors egress☆46Updated 5 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Does your library check TLS certificates properly?☆79Updated last year
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆15Updated 2 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last year
- DHCP option injector☆42Updated 4 years ago
- DNS Firewall Enforcer☆49Updated 6 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- ip6.arpa scanner☆31Updated 8 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 12 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Web of trust grapher☆38Updated last week
- Repository for Security Workshop content☆20Updated 7 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆28Updated last year
- D4 core software (server and sample sensor client)☆42Updated last year
- ☆27Updated last month
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆108Updated 6 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago